<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Malware Attacks Archives - Teksalah - Beyond Solutions</title>
	<atom:link href="https://teksalah.com/category/blogs/malware-attacks/feed/" rel="self" type="application/rss+xml" />
	<link>https://teksalah.com/category/blogs/malware-attacks/</link>
	<description>Transformation Experts</description>
	<lastBuildDate>Thu, 09 Apr 2020 05:52:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://teksalah.com/wp-content/uploads/2018/10/favicon.png</url>
	<title>Malware Attacks Archives - Teksalah - Beyond Solutions</title>
	<link>https://teksalah.com/category/blogs/malware-attacks/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Telltale signs of a compromised mobile device and malware infiltration</title>
		<link>https://teksalah.com/telltale-signs-of-a-compromised-mobile-device-and-malware-infiltration/</link>
		
		<dc:creator><![CDATA[Blogger]]></dc:creator>
		<pubDate>Tue, 05 Nov 2019 12:31:46 +0000</pubDate>
				<category><![CDATA[Blogs]]></category>
		<category><![CDATA[Malware Attacks]]></category>
		<category><![CDATA[advance malware]]></category>
		<category><![CDATA[EMM]]></category>
		<category><![CDATA[modern malware]]></category>
		<category><![CDATA[telltale signs of mobile malware infection]]></category>
		<category><![CDATA[zero click zero day]]></category>
		<guid isPermaLink="false">https://teksalah.com/?p=1211</guid>

					<description><![CDATA[<p>With smartphones we store a huge amount of personal and organizational sensitive information...</p>
<p>The post <a href="https://teksalah.com/telltale-signs-of-a-compromised-mobile-device-and-malware-infiltration/">Telltale signs of a compromised mobile device and malware infiltration</a> appeared first on <a href="https://teksalah.com">Teksalah - Beyond Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="size-full wp-image-1212" src="https://teksalah.com/wp-content/uploads/2019/11/Screen-Shot-2019-11-05-at-3.44.05-PM.png" alt="tell tale signs of mobile malware" width="1402" height="724" srcset="https://teksalah.com/wp-content/uploads/2019/11/Screen-Shot-2019-11-05-at-3.44.05-PM.png 1402w, https://teksalah.com/wp-content/uploads/2019/11/Screen-Shot-2019-11-05-at-3.44.05-PM-300x155.png 300w, https://teksalah.com/wp-content/uploads/2019/11/Screen-Shot-2019-11-05-at-3.44.05-PM-768x397.png 768w, https://teksalah.com/wp-content/uploads/2019/11/Screen-Shot-2019-11-05-at-3.44.05-PM-1024x529.png 1024w, https://teksalah.com/wp-content/uploads/2019/11/Screen-Shot-2019-11-05-at-3.44.05-PM-30x15.png 30w" sizes="(max-width: 1402px) 100vw, 1402px" /></p>
<p>With smartphones we store a huge amount of personal and organizational sensitive information. While cybersecurity hardening for the servers, pc/endpoint computers have greatly improved and adopted. Mobile device protection is yet not in the stage of “consideration” for many. Hence, hackers consider smartphones now as a much more exposed target.With the advent of sophisticated “zero click zero day” malware targeting mobile device platforms and the kind of cyber-espionage campaigns that are being surfaced, it is critical to take the action quickly.</p>
<p>A <strong>zero click zero day </strong>can be understood as – “Unknown exploitable vulnerability” (known to and exploited by threat actors) if targeted could compromise the subject by sending a simple URL that didn’t even need to be clicked/ triggered by victim or just by visiting a website.</p>
<p>In the recent findings by industry researchers, a simple message with link, or a whatsapps video miscall could compromise a vulnerable mobile device.This opens up a lot low hanging and need for immediate action.<br />
Put together, below are a few telltale signs of a malware infected mobile device;</p>
<ul>
<li>Unknown apps in your device / apps getting installed automatically</li>
<li>Frequent restarts of device</li>
<li>Slowdown, Sluggish performance</li>
<li>Significant drop in device battery backup cycles</li>
<li>Sending receiving cryptic text messages and calls –by itself</li>
<li>Strange background noise during the calls</li>
<li>Abnormalities in data/network usage.</li>
<li>Lost credentials of other accounts</li>
</ul>
<p>Barring device problems, these are considered among the major sings of malicious activity in mobile devices.</p>
<p><strong>What can be done to secure?</strong><br />
Modern malwares are engineered to “not getting found”, Unless we act cautiously it is difficult to defend also with advance capabilities like clearing the traces and self-destruct features, prevention is always better than cure. Here are our recommendations.</p>
<ul>
<li>Always keep the mobile operation system up-to-date.</li>
<li>Ensure your smart device is protected with mobile endpoint security.</li>
<li>Download only secure applications.</li>
<li>Restrict apps and their permission to minim required and disable information sharing between apps.</li>
<li>Avoid connecting to public untrusted wifi networks or mobile charging kiosks.</li>
<li>Disable Bluetooth / IR/ NFC etc when not in use.</li>
<li>Avoid rooting your device</li>
<li>Enterprises and business must consider deploying enterprise mobility management (EMM) technology.</li>
</ul>
<h6></h6>
<h6></h6>
<p>* Disclaimer:  The above blog post is of information purpose only.</p>
<p>The post <a href="https://teksalah.com/telltale-signs-of-a-compromised-mobile-device-and-malware-infiltration/">Telltale signs of a compromised mobile device and malware infiltration</a> appeared first on <a href="https://teksalah.com">Teksalah - Beyond Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fileless Malware Attacks</title>
		<link>https://teksalah.com/fileless-malware-attacks/</link>
					<comments>https://teksalah.com/fileless-malware-attacks/#respond</comments>
		
		<dc:creator><![CDATA[Blogger]]></dc:creator>
		<pubDate>Wed, 14 Aug 2019 13:22:59 +0000</pubDate>
				<category><![CDATA[Blogs]]></category>
		<category><![CDATA[Malware Attacks]]></category>
		<category><![CDATA[Fileless Attacks]]></category>
		<category><![CDATA[Malware attacks]]></category>
		<category><![CDATA[SIEM]]></category>
		<guid isPermaLink="false">https://teksalah.com/?p=1180</guid>

					<description><![CDATA[<p>Fileless malware is a type of malicious code that is advance in its nature and uses legitimate programs to infect a computer and exists exclusively memory-based. </p>
<p>The post <a href="https://teksalah.com/fileless-malware-attacks/">Fileless Malware Attacks</a> appeared first on <a href="https://teksalah.com">Teksalah - Beyond Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h5>Fileless Malware and a bit of what it is</h5>
<p>Fileless malware is a type of malicious code, that is advance in nature which uses legitimate programs to infect a computer that exists exclusively memory-based.</p>
<p>It is known to hijack programs and tools of the victim’s system for attacking. As simple as PowerShell, Shell, WMI, macros becoming vulnerable for executing malicious code. This does not rely on traditional malware techniques and leaves very little to no-footprint, making it challenging to detect. In most cases, it becomes traceless with a reboot of the system.</p>
<p>Fileless malware attacks know to evade defenses like &#8211; application whitelisting as they take advantage of applications that are already installed and are on the approved list.</p>
<p>To understand further, no operating system is foolproof and the industry has seen advance fileless malware attacks on Windows, Linux, and other OS platforms. Similar to most of the attacks, fileless attacks are known to be using email spear-phishing, social engineering techniques and lateral moment to gain access rights to their targets. Mostly by taking over vulnerable legitimate programs and riding on their back.</p>
<h5>Approaches to detect the infection</h5>
<p>Chances are that your EPP/ EDR may have been bypassed already, and if they don’t help in detection, using below approaches would help you uncover an ongoing attack.<br />
⁃ A well-tuned SIEM can help in detection. Usually based on the correlated behavior that the infected triggers.<br />
⁃ A Threat hunting exercise; analyzing through ‘in-memory’ and system file integrity analysis.<br />
⁃ Digital forensics (labor and $ intensive)</p>
<h5>Approaches know to prevent</h5>
<p>-Nothing beats keeping software up to date with patches.<br />
⁃ Sound endpoint protection in combination with Gateway email threat prevention.<br />
⁃ Reducing the attack surface; disabling the unwanted services, programs and exposure.<br />
⁃ Admin user protection, Privileged Access Management to control unrestricted admin access.<br />
⁃ Regular Penetration Testing exercises would help harden the infrastructure</p>
<p>Preventing and Detecting the fileless malware attacks early in the attack cycle needs an end-to-end approach addressing the entire threat lifecycle with well-defined controls in place at different layers.</p>
<h5>Overview of a File-less malware attack/ Advance Volatile Threat:<br />
<img decoding="async" class="alignnone wp-image-1181 size-full" src="https://teksalah.com/wp-content/uploads/2019/08/Screen-Shot-2019-08-11-at-11.53.21-AM.png" alt="File-Less Malware Attack" width="1124" height="328" srcset="https://teksalah.com/wp-content/uploads/2019/08/Screen-Shot-2019-08-11-at-11.53.21-AM.png 1124w, https://teksalah.com/wp-content/uploads/2019/08/Screen-Shot-2019-08-11-at-11.53.21-AM-300x88.png 300w, https://teksalah.com/wp-content/uploads/2019/08/Screen-Shot-2019-08-11-at-11.53.21-AM-768x224.png 768w, https://teksalah.com/wp-content/uploads/2019/08/Screen-Shot-2019-08-11-at-11.53.21-AM-1024x299.png 1024w, https://teksalah.com/wp-content/uploads/2019/08/Screen-Shot-2019-08-11-at-11.53.21-AM-30x9.png 30w" sizes="(max-width: 1124px) 100vw, 1124px" /></h5>
<p>The post <a href="https://teksalah.com/fileless-malware-attacks/">Fileless Malware Attacks</a> appeared first on <a href="https://teksalah.com">Teksalah - Beyond Solutions</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://teksalah.com/fileless-malware-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
